Advanced
Robust Decision Feedback Equalizer for OFDM System under Severe ISI Channel
Robust Decision Feedback Equalizer for OFDM System under Severe ISI Channel
KSII Transactions on Internet and Information Systems (TIIS). 2014. Jun, 8(6): 1914-1925
Copyright © 2014, Korean Society For Internet Information
  • Received : February 10, 2014
  • Accepted : April 26, 2014
  • Published : June 28, 2014
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Xin Su
Bing Hui
KyungHi Chang

Abstract
Inter-symbol interference (ISI) problem is inevitable when the guard interval (GI) is shorter than the delay spread (DS) for an orthogonal frequency division multiplexing (OFDM) system. Iterative techniques have been proposed to overcome such a problem. However, most of existing algorithms are not efficient for an OFDM system with a small GI working under the channel with a large DS. Especially in the case of the DS spans a longer time than the half of the OFDM symbol duration. On the other hand, conventional algorithms, which can reduce the effects of the severe ISI, often employ several impractical assumptions to support the conclusions. In this paper, we present a robust decision feedback equalizer (DFE) for the OFDM system to overcome the severe ISI problem. The proposed DFE removes the ISI in a same manner as the residual inter-symbol interference cancellation (RISIC) algorithm. However, the inter-carrier interference (ICI) is reduced via cyclicity removal instead of the cyclicity restoration used in the conventional algorithms. The link-level simulation (LLS) results indicate that our proposed DFE scheme can dramatically improve the BER performance when the DS spans longer than the half of ODFM symbol duration.
Keywords
DFEOFDMISIICIcyclicity removal
1. Introduction
O FDM system performance degrades severely when the length of guard interval (GI) is not sufficient to eliminate the effects of delay spread (DS). Therefore, an OFDM system with a small GI cannot perform well in the environments with a comparatively large DS. For example, the IEEE 802.11p (WAVE) OFDM system uses 64 subcarriers, including 48 data carriers, 4 pilots, and 11 virtual carriers, which occupy a channel bandwidth of 10 MHz [1] . In this case, among 80 samples of one OFDM symbol, the GI uses 16 samples covering 1.6 μs and the fast Fourier transform (FFT) interval holds 64 samples expending 6.4 μs. However, the measured channel with the DS of several microseconds in [2] and [3] inevitably leads the WAVE system into a severe inter-symbol interference (ISI) environment, where the length of the DS is usually longer than half of the symbol duration. Along with the ISI, the inter-carrier interference (ICI) that arises from the loss of the sub-channel orthogonality in an OFDM symbol is known to limit the performance of the system. Simply increasing the length of GI in order to reduce the ISI, however, results in drawbacks due to the tradeoff regarding the spectral efficiency.
Iterative techniques have been proposed in order to overcome the problem of GI insufficiency [4] - [11] . Let D and G represent the length of DS and GI in unit of OFDM sample, respectively. The RISIC algorithm presented in [4] and RISIC-based algorithms [5] - [11] are effective when the ( D - G ) difference is moderate. However, as the difference becomes larger, they cannot obtain a reliable signal in its initial step for the iteration, thereby causing degradation in the bit-error-rate (BER) performance. In [8] , a reconstruction procedure of the cyclic prefix is proposed to restore the cyclicity of the i -th received symbol by adding the weighted ( i +1)-th received symbol to the i -th received symbol. Hence, it can obtain a reliable estimation of the i -th transmitted symbol before the first iteration that mitigates the problem caused by the increased ( D - G ). The simulation results show that this procedure can maintain the system performance effectively as the D is incremented up to 55% of the symbol duration. However, several impractical assumptions are made in [8] , including that the ISI removal is perfect and the noise is negligible. As is known, the ISI becomes severe with the DS increment, which leads to inaccurate symbol estimation. It is also known that the required signal for the cyclicity reconstruction of the i -th received symbol cannot be easily found in the first ( D - G ) samples, which are already severely affected by ISI, of the ( i +1)-th received symbol. Therefore, we conclude that the cyclicity of the i -th symbol cannot be easily reconstructed by adding the weighted ( i +1)-th received symbol to the i -th received symbol due to the severe ISI. In this paper, we modify the RISIC scheme using several strategies which enable the modified RISIC (M-RISIC) to work efficiently under the severe ISI scenario.
The proposed decision feedback equalizer (DFE) in this paper removes the ISI in a same manner as the RISIC [4] - [11] . However, the ICI is reduced via cyclicity removal instead of the cyclicity restoration used in [4] - [11] . Additionally, the hard decision block (HDB) in the frequency-domain is implemented for the decision on frequency-domain symbol sequence associated with correct constellation positions. The usage of the hard decision can prevent the outputs from the error propagations of which are fed back to the outer and inner loops. According to the simulation results, we verify that the proposed DFE outperforms the conventional RISIC in terms of the BER performance with a less number of iterations, e.g., 3. And compared with scheme in [8] as mentioned above, the proposed M-RISIC is more practical since it is suggested without the assumptions of ISI perfect removal and no additive noise.
The rest of this paper is orgnized as follows. In section 2, the system model is described. Section 3 illustrates the proposed M-RISIC along with the discussion of the realiability. The link level simulation (LLS) results of the M-RISIC are given and discussed in Section 4. And finally, we conclude this paper in section 5.
2. System Model
Throughout this paper, a perfect channel estimation by using the preamble is assumed. We use an OFDM packet, which is composed of a preamble and several OFDM data symbols, for the investigation of the proposed M-RISIC. Let pk and Pk denote the preamble in the time and frequency-domain, respectively. The N -point inverse fast Fourier transform (IFFT) output sequence for the preamble is given by
PPT Slide
Lager Image
where k denotes the sample index. In addition, let xi,k and Xi,k denote the i -th OFDM data symbol of the packet in the time and frequency-domain, respectively. The N -point IFFT output sequence is calculated as
PPT Slide
Lager Image
By (1) and (2),
PPT Slide
Lager Image
and
PPT Slide
Lager Image
represent the frequency-domain symbol sequences with FFT size of N . If the GI is a cyclic extension of the IFFT output sequence, then the IFFT output sequence with the addition of the GI are
PPT Slide
Lager Image
PPT Slide
Lager Image
where G is the length of the GI in the unit of sample, and ( k ) N is the residue of the k modulo N . Sequences of
PPT Slide
Lager Image
and
PPT Slide
Lager Image
where ' g ' represents the signal after GI extension, are then passed through a digital-to-analog (D/A) converter at a sampling frequency of 1/ Ts . And Ts is the sample duration of the OFDM signal.
By assuming the channel impluse response (CIR) is constant over a packet period, the received preamble
PPT Slide
Lager Image
and the i -th OFDM symbol rg i,k at Rx in the time-domain then can be represented as
PPT Slide
Lager Image
PPT Slide
Lager Image
where * is the notation of convolution, hm ( m = 1, 2, 3, ... , M ) refers the m -th CIR with the DS of Dm in the time-domain and nk denotes the additive white Gaussian noise (AWGN) at the k -th sample. The GI is then removed from the received signal to obtain
PPT Slide
Lager Image
and ri,k , which will be converted back to the frequency-domain via FFT operation for subsequent demodulation processes in an OFDM system.
3. The Proposed M-RISIC Algorithm
To obtain the desired system output along with the residual ISI, two steps are proposed in the time-domain of the RISIC algorithm [4] . The first step is to remove the residual ISI from the previously received OFDM symbol, and the second step is to use reconstruction to restore the cyclicity in order to avoid the ICI. These two steps are called tail cancellation and cyclicity restoration, respectively. The overall procedure of RISIC algorithm can be described as (7), where the residual ISI, denoted as the second term, is removed from the received signal sequence
PPT Slide
Lager Image
before the iteration process. Cyclicity, on the other hand, is restored by the last term in (7) to avoid ICI via the iteration process.
PPT Slide
Lager Image
Fig. 1 illustrates an example of a two-path channel model with the ISI. According to Fig. 1 , the residual ISI exists in the tail, which spans from the ( N - 1 - Cm )-th to the ( N - 1 )-th samples, of the ( i-1 )-th OFDM symbol from the second path. Here, Cm = Dm - G . And, the ICI comes from the first to ( N - Cm )-th samples of the i -th OFDM symbol on the second path.
PPT Slide
Lager Image
An example of a two-path channel model with the ISI.
In the conventional algorithms [4] - [11] , the last term in (7) tries to restore the cyclicity of the i -th OFDM symbol by adding the estimated sequence, i.e., from the first to ( Cm -1 )-th samples of the i -th OFDM symbol, via the iteration process. However, as illustrated in Fig. 1 , if the DS value Dm increases, the length of the estimated sequence is extended since the value of Cm becomes larger. It inevitably brings more errors into the initial step before the iteration. In M-RISIC, we modify RISIC by performing cyclicity removal (i.e., directly subtracting ICI of i -th symbol from the second path as illustrated in Fig. 1 ) instead of cyclicity reconstruction to restore the cyclicity of the i -th OFDM symbol. Thus, (7) is modified as
PPT Slide
Lager Image
which indicates that the ICI, i.e., from the first to the ( N – Cm –1 )-th samples, of the i -th OFDM symbol in delayed paths should be removed by the last term of (8).
- A. Discussion on Reliability of RISIC and M-RISIC
In this part, the reliability of the RISIC and M-RISIC algorithms are analyzed according to the iteration procedure, which refers the steps of ICI iterative cancellation in RISIC-based algorithms.
- 1) Before the iteration procedure
The amount of the ISI for both RISIC and M-RISIC are same, and they are removed by the second terms in (7) and (8), respectively. The difference between (7) and (8) comes from their last term. That is, according to [8] , the estimation error fed into the loops of iteration is proportional to the length of estimated sequence. When the condition of Cm >( N-G )/2 is fulfilled, the estimation error of the RISIC algorithm is more than the M-RISIC algorithm since the length of estimated sequence of the former is longer than the latter. The estimation error for both algorithms are same when Cm = ( N-G )/2 fulfilled, and the estimation error of the proposed M-RISIC is more than the RISIC when Cm <( N-G )/2. Thus, we can obtain a relationship between the estimation error and Cm based on the last term of (7) and (8) as
PPT Slide
Lager Image
- 2) After the iteration procedure
In the perspective of the desired power of
PPT Slide
Lager Image
, the RISIC uses the cyclicity restoration to save the desired power of the delayed path, while the M-RISIC subtracts the effect of the delay path. Therefore, compared with the RISIC, the proposed M-RISIC is not SNR efficient. However, as is known, the key condition affecting the performance is the amount of error fed into the iteration process. If an accurate estimated sequence
PPT Slide
Lager Image
shown in Fig. 2 cannot be obtained, the power of the delayed paths becomes the interference that degrades the system performance.
PPT Slide
Lager Image
DFE structure of the M-RISIC algorithm.
According to the analysis above, we can conclude that the proposed M-RISIC is a robust iteration algorithm for an OFDM system which can perform well when the DS spans longer than the half of the OFDM symbol duration.
- B. The Operation Procedures of the Proposed M-RISIC
In order to overcome the severe ISI problem, we modify the RISIC algorithm as shown in Fig. 2 , where the modified blocks are filled by color. The details are described as follows:
  • 1) A perfectly channel estimation is assumed. And, the first block inFig. 2is assumed to have the preambles which are used for the removal of residual ISI in the information symbols.
  • 2) At the receiver, after the GI removal and FFT process, decisions regarding the transmitted sampleson symbol (i-1) are obtained and converted back to the time-domain by using IFFT, given as, for use in the tail cancellation.
  • 3) For thei-th symbol, the M-RISIC performs its tail cancellation by calculating the residual ISI and subtracts it fromvia the second term of (8) to obtain, where '(0)' represents the state before the iteration.
  • 4) Theobtained in Step 3 andh1are converted to the frequency-domain asandH1, respectively.
  • 5) Then, the zero forcing (ZF) strategy can be used for the frequency-domain channel equalization to make the decisions on
  • 6) Afterwards, the decisions are converted back to the time-domain as.
  • 7) The ICI is generated by convolution ofandhmin the time domain, and the cyclicity removal is performed as the third term of (8) by subtracting the ICI from. This step mitigates the ICI in the received symbol and yields, whereIrepresents an iteration number with an initial value ofI= 1.
  • 8) Thenis converted to the frequency-domain as.
  • 9) InFig. 2, the last block is the proposed hard decision block (HDB) in the frequency-domain. The HDB is implemented for the decision on frequency-domain symbol sequenceassociated with correct constellation positions. The usage of the hard decision can prevent the outputs from the error propagations of which are fed back to the outer and inner loops inFig. 2. This block completes theI-th iteration in the M-RISIC algorithm.
  • 10) For further iterations, convert thetoand repeat Steps 5 to 9 withIreplaced by (I+1). Note that, when the iteration is done, i.e.,I=Imax, the equalized decisionsare the output of M-RISIC, which will be forwarded to the OFDM parallel-to-serial (P/S) block for further demodulation.
- C. Combination of RISIC and M-RISIC Algorithms
Since the performances of RISIC and the proposed M-RISIC are related with the difference of ( D - G ), i.e., Cm , we further suggest a DFE system with the combination of the RISIC and the M-RISIC algorithms. That is, the selection on DFE algorithm for an OFDM system to overcome the effect of ISI should be based on the estimated value of Cm . Fig. 3 shows the function of the suggested DFE structure associated with the combination of the RISIC and M-RISIC algorithms.
PPT Slide
Lager Image
DFE structure with the combination of the RISIC and M-RISIC algorithms at the receiver.
4. Performance Verification of M-RISIC
- A. Simulation Environment
The details of the WAVE OFDM system parameters under test are described in Table 1 . We consider a scenario of [2] where the first path is a Rician distributed path generated by the line-of-sight (LOS) component, and the second is a Rayleigh distributed path generated by the non-LoS component. With the assumption that each path is constant over a packet period, the mathematical channel modeling is given by
PPT Slide
Lager Image
where h 1 k ( t ) and h 2 k ( t ) are two independent Rayleigh distributions. h 1 k ( t ) is used to generate the Rician path by the K -factor ( Kf ). R is the relative power decay of the Rayleigh path, and D is the relative delay of the Rayleigh path to the first LOS path. Note that the delay of the Rayleigh path was set to 5 μs, which spans 62.5% of the OFDM symbol duration.
Link-level Simulation Parameters
PPT Slide
Lager Image
Link-level Simulation Parameters
Moreover, we set the maximum relative mobility between the transmitter and the receiver as 50 Km/h, and they communicate in an SISO transceiver manner.
- B. Performance Verification
We compare the link-level performances of the RISIC and M-RISIC algorithms, where both of them work associated with the perfect time-domain channel estimation. Fig. 4 shows the BER performances of the RISIC and M-RISIC. According to the figure, we observe that the WAVE with 1-tap frequency-domain equalizer (FDE) has the highest BER under severe ISI condition, where the error floor continues around 10 -2 . The RISIC yields a higher BER compared with the proposed M-RISIC when the DS spans 62.5% of the OFDM symbol duration. And the proposed M-RISIC can achieve the target BER of 10 -4 with the Imax equaling to three.
PPT Slide
Lager Image
BER performance of the WAVE with RISIC and M-RISIC.
Fig. 4 also shows the efficiency of the proposed HDB, and the gain of SNR is obtained when the HDB is implemented. For example, 0.6dB gain is achieved in the case of RISIC with the HDB at target BER of 10 -2 . And 0.5dB SNR loss at the target BER of 10 -3 if no HDB is used in the M-RISIC. In addition, the lower bound curve obtained by using a large Imax value, (e.g., 50) for the M-RISIC is given as a comparison. Note that, when the packet size increases, the DFE performances inevitably become worse due to the error propagation. This is because the current symbol is determined based on the previous one.
For further comparison on the RISIC and M-RISIC with various DS values, we fix Eb/N0 as 15 dB and observe the BER performance based on the different channel DS. According to Fig. 5 , we observe that the performance of RISIC algorithm is better than M-RISIC when the ratio less than or equal to 0.5, i.e., the channel DS spans less than or equal to 50% of the OFDM symbol duration. And the performance of RISIC algorithm becomes worse when the ratio is larger than 0.5, which validates our reliability analysis in Section 3. At the ratio of 0.5, RISIC outperforms M-RISIC mainly due to that RISIC is SNR efficient by saving power of the delayed path. Therefore, the combination of the RISIC and M-RISIC can adaptively choose the cyclicity restoration or cyclicity removal scheme to reduce the amount of estimation error based on Cm .
PPT Slide
Lager Image
BER performance at the different channel DS span.
5. Conclusions
The main contribution of this paper is that we propose a robust DFE structure for OFDM systems in order to overcome the effect of severe ISI channel. By implementing several strategies, such as cyclicity removal and symbol hard decisions in the M-RISIC, our proposed receiver structure can achieve the target BER with less number of iterations compared with the conventional algorithm.When the HDB is implemented, additional SNR gain can be achieved under the channel having a comparatively larger delay spread, e.g., spanning 62.5% of an OFDM symbol duration. In addition, by the algorithm reliability analysis, the selection of DFE for the OFDM system should be based on the index of Cm . Referring the BER performances of RISIC and M-RISIC, though the M-RISIC outperforms RISIC when the DS spans a longer time than half of OFDM symbol duration, there exists tradeoff between DS and the performance. Thus, the RISIC and M-RISIC can be adaptively selected to maintain the system performance.
BIO
Xin Su received the B.S. degree in computer engineering from Kunming University of Science and Technology, China, in 2008. He received a M.S. degree in computer engineering from Chosun University, Korea, in 2010. Since 2011, he is working as a Ph.D. student with the Program in IT & Media Convergence Studies, Inha University, Korea. His research interests include the 3GPP LTE(-A) systems, MIMO beamforming, antenna pattern and polarization based MIMO systems, wireless backhaul solution, and mobile Ad-Hoc networks.
Bing Hui received a B.S. degree in communication engineering from Northeastern University, Shenyang, China, in 2005. He received M.Eng. degree and Ph.D. degree at the Graduate School of Information Technology and Telecommunications, Inha University, Incheon, Korea, in 2009 and 2013 respectively. Since 2013, he is working as a Post-doctoral researcher in the Electronic Engineering Department, Inha University, Incheon, Korea. His research interests include the 3GPP LTE(-A) systems, precoding and detection schemes for MIMO systems, optimal codebook design with limited feedback, interference mitigation techniques in cellular network, and mobile Ad-Hoc networks.
KyungHi Chang received his B.S. and M.S. degrees in electronics engineering from Yonsei University, Seoul, Korea, in 1985 and 1987, respectively. He received his Ph.D. degree in electrical engineering from Texas A&M University, College Station, Texas, in 1992. From 1989 to 1990, he was with the Samsung Advanced Institute of Technology (SAIT) as a member of research staff and was involved in digital signal processing system design. From 1992 to 2003, he was with the Electronics and Telecommunications Research Institute (ETRI) as a principal member of technical staff. During this period, he led the design teams working on the WCDMA UE modem and 4G radio transmission technology (RTT). He is currently with the Electronic Engineering Department, Inha University, where he has been a professor since 2003. His current research interests include RTT design for Beyond 3GPP LTE-A & 5G systems, cross-layer design, cognitive radio, and mobile Ad-Hoc networks. Dr. Chang has served as a senior member of IEEE since 1998, and as an editor-in-chief & an executive director during 2010~2012 and 2013, respectively, for the Journal of Korean Institute of Communications and Information Sciences (KICS). Currently, he is an executive director for business affairs regarding mobile communications of KICS. He has also served as an editor of ITU-R TG8/1 IMT.MOD, and he is currently an international IT standardization expert of the Telecommunications Technology Association (TTA). He is an recipient of the LG Academic Awards (2006), Haedong Best Paper Awards (2007), IEEE ComSoc Best Paper Awards (2008), and Haedong Academic Awards (2010).
References
2007 IEEE Std. 802.11-2007, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Article (CrossRef Link)
2007 ETSI TR 102 580 (V1.1.1), Technical report: Terrestrial trunked radio (TETRA); Release 2; Designer’s guide; TETRA high-speed data (HSD); TETRA enhanced data service (TEDS) Article (CrossRef Link)
Yang K. , Roste T. , Bekkadal F. , Ekman T. 2010 “Channel characterization including path loss and Doppler effects with sea reflections for mobile radio propagation over sea at 2 GHz” in Proc. of WCSP Int. Conf. Oct. Article (CrossRef Link) 1 - 6
Kim D. , Stuber G. L. 1998 “Residual ISI Cancellation for OFDM with application to HDTV broadcasting” IEEE Journal on Selected Areas in Communication Article (CrossRef Link) 16 (8) 1590 - 1599    DOI : 10.1109/49.730464
Yang Z. , Bai W. , Lin Z. 2006 “A decision-aided residual ISI cancellation algorithm for OFDM systems” in Proc. of ICOSP Int. Conf. Nov. Article (CrossRef Link) 20 - 23
Yang Z. , Bai W. , Lin Z. 2006 “A novel residual ISI cancellation for OFDM system with applications to wireless LAN” in Proc. of IET Int. Conf. Nov. Article (CrossRef Link) 1 - 4
Zhong W. , Mao Z. G. 2006 “Efficient time-domain residual ISI cancellation for OFDM-based WLAN systems” IEEE Trans on Consumer Electronic Article (CrossRef Link) 52 (2) 321 - 326    DOI : 10.1109/TCE.2006.1649645
Park C. , Im G. 2004 “Efficient cyclic prefix reconstruction for coded OFDM systems” IEEE Communications Letters Article (CrossRef Link) 8 (5) 274 - 276    DOI : 10.1109/LCOMM.2004.827439
Zhu J , Ser W. , Nehorai A. 2000 “Channel equalization for DMT with insufficient cyclic prefix” in Prof. of Signals, Systems and Computers Oct. Article (CrossRef Link) 951 - 955
Wolfgang. Lesch , MS thesis 1998 Impulse Response Shortening for OFDM in a Single Frequency Network. Royal Institute of Technology Stockholm MS thesis Article (CrossRef Link)
Ahn S. K. , Yang Y. C. 2013 “A novel subblock-based frequency-domain equalizer over doubly-selective channels” IEEE Communications Letters Article (CrossRef Link) 17 (8) 1517 - 1520    DOI : 10.1109/LCOMM.2013.070113.131115